File name:

vac.exe

Full analysis: https://app.any.run/tasks/42762f40-aebb-4ccb-9164-0317bcd2614c
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: April 29, 2025, 22:23:20
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
python
trox
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows, 12 sections
MD5:

CB367EE9025955F6C0ECBBFF997BDBDE

SHA1:

B98984ACB1CCCF33F962DCC01037E83AADFF95C6

SHA256:

A485396EF2FA4D5B1A2712956521D7820A829DAA5AAF0A63A488B6A23D972E44

SSDEEP:

196608:0Vx+QRPhfMxNgycpe5CEht3s9zwzvaN+wQpd:6JExNPcQ5Ap2qgd

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • TROX has been detected

      • vac.exe (PID: 5936)
  • SUSPICIOUS

    • Process drops python dynamic module

      • vac.exe (PID: 5936)
    • Process drops legitimate windows executable

      • vac.exe (PID: 5936)
    • Executable content was dropped or overwritten

      • vac.exe (PID: 5936)
    • The process drops C-runtime libraries

      • vac.exe (PID: 5936)
    • Loads Python modules

      • vacdecryptor.exe (PID: 300)
    • Reads security settings of Internet Explorer

      • vac.exe (PID: 5936)
  • INFO

    • The sample compiled with english language support

      • vac.exe (PID: 5936)
    • Create files in a temporary directory

      • vac.exe (PID: 5936)
    • Checks supported languages

      • vac.exe (PID: 5936)
      • vacdecryptor.exe (PID: 300)
    • Reads the computer name

      • vac.exe (PID: 5936)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2023:08:16 23:35:06+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Large address aware, No debug
PEType: PE32+
LinkerVersion: 2.38
CodeSize: 115200
InitializedDataSize: 8316416
UninitializedDataSize: 65024
EntryPoint: 0x1125
OSVersion: 4
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
131
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #TROX vac.exe conhost.exe no specs vacdecryptor.exe no specs sppextcomobj.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
300"C:\Users\admin\AppData\Local\Temp\vac.exe" C:\Users\admin\AppData\Local\Temp\onefile_5936_133904390085575071\vacdecryptor.exevac.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\onefile_5936_133904390085575071\vacdecryptor.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
904\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exevac.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4688"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5936"C:\Users\admin\AppData\Local\Temp\vac.exe" C:\Users\admin\AppData\Local\Temp\vac.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\vac.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
6048C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
Total events
550
Read events
550
Write events
0
Delete events
0

Modification events

No data
Executable files
49
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
5936vac.exeC:\Users\admin\AppData\Local\Temp\onefile_5936_133904390085575071\vacdecryptor.exeexecutable
MD5:D1636DA0D08151B296BA5387E02EE258
SHA256:5A218A65E4E5320CC1A4B4428A1E1A44AC68A43CB18E608E8A9C55FFAFB16CED
5936vac.exeC:\Users\admin\AppData\Local\Temp\onefile_5936_133904390085575071\_hashlib.pydexecutable
MD5:4255C44DC64F11F32C961BF275AAB3A2
SHA256:E557873D5AD59FD6BD29D0F801AD0651DBB8D9AC21545DEFE508089E92A15E29
5936vac.exeC:\Users\admin\AppData\Local\Temp\onefile_5936_133904390085575071\api-ms-win-core-handle-l1-1-0.dllexecutable
MD5:10F0C22C19D5BEE226845CD4380B4791
SHA256:154EF0BF9B9B9DAA08101E090AA9716F0FA25464C4EF5F49BC642619C7C16F0E
5936vac.exeC:\Users\admin\AppData\Local\Temp\onefile_5936_133904390085575071\_queue.pydexecutable
MD5:F00133F7758627A15F2D98C034CF1657
SHA256:35609869EDC57D806925EC52CCA9BC5A035E30D5F40549647D4DA6D7983F8659
5936vac.exeC:\Users\admin\AppData\Local\Temp\onefile_5936_133904390085575071\api-ms-win-core-file-l2-1-0.dllexecutable
MD5:7F14FD0436C066A8B40E66386CEB55D0
SHA256:C78EAB8E057BDDD55F998E72D8FDF5B53D9E9C8F67C8B404258E198EB2CDCF24
5936vac.exeC:\Users\admin\AppData\Local\Temp\onefile_5936_133904390085575071\_cffi_backend.pydexecutable
MD5:FDE9A1D6590026A13E81712CD2F23522
SHA256:16ECCC4BAF6CF4AB72ACD53C72A1F2B04D952E07E385E9050A933E78074A7D5B
5936vac.exeC:\Users\admin\AppData\Local\Temp\onefile_5936_133904390085575071\api-ms-win-core-namedpipe-l1-1-0.dllexecutable
MD5:0E5CD808E9F407E75F98BBB602A8DF48
SHA256:1846947C10B57876239D8CB74923902454F50B347385277F5313D2A6A4E05A96
5936vac.exeC:\Users\admin\AppData\Local\Temp\onefile_5936_133904390085575071\api-ms-win-core-localization-l1-2-0.dllexecutable
MD5:71457FD15DE9E0B3AD83B4656CAD2870
SHA256:DB970725B36CC78EF2E756FF4B42DB7B5B771BFD9D106486322CF037115BD911
5936vac.exeC:\Users\admin\AppData\Local\Temp\onefile_5936_133904390085575071\api-ms-win-core-processenvironment-l1-1-0.dllexecutable
MD5:CC52CD91B1CBD20725080F1A5C215FCC
SHA256:990DC7898FD7B442D50BC88FEC624290D69F96030A1256385391B05658952508
5936vac.exeC:\Users\admin\AppData\Local\Temp\onefile_5936_133904390085575071\api-ms-win-core-memory-l1-1-0.dllexecutable
MD5:D39FBBEAC429109849EC7E0DC1EC6B90
SHA256:AEEC3D48068137870E6E40BAD9C9F38377AA06C6EA1AC288E9E02AF9E8C28E6B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
20
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6872
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6872
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.216.77.28:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.4:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
2112
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
whitelisted
google.com
  • 142.250.185.110
whitelisted
crl.microsoft.com
  • 23.216.77.28
  • 23.216.77.6
whitelisted
www.microsoft.com
  • 2.23.246.101
  • 95.101.149.131
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 20.190.160.4
  • 20.190.160.3
  • 20.190.160.128
  • 20.190.160.132
  • 20.190.160.22
  • 20.190.160.130
  • 20.190.160.2
  • 40.126.32.72
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted

Threats

No threats detected
No debug info